Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (290)
  • News (29)
  • Article (10)
Keywords

« Previous 1 ... 25 26 27 28 29 30 31 32 33 Next »

42%
The fail2ban intrusion prevention framework
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Flavijus Piliponis, 123RF.com
on a server, any user who gets a password wrong more than three times is going to need a new password (from a Support Department most likely), so I'd prefer not to allow nefarious types to keep trying
42%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
is based on Nagios (Figure 3). Figure 3: Opsview offers a lean and clear-cut web interface but still lets administrators add new hosts and services in the GUI
42%
Filtering email with Sieve
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© radist777, 123RF.com
as a placeholder. Another new thing in this example is the allof option, which defines that all of the conditions must apply, rather than just one of them. In other words, both the sender and the subject line must
42%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
ConnectBot, found on its Google page [3] or through the Market app. It includes support for SSH keys, which is useful on a mobile platform that might need to reconnect occasionally. Send an Esc by hitting
42%
Service management by the book
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Michael Flippo, Fotolia.com
to a change in the help desk software needed to fulfill these new requirements and typically means implementing some kind of service management software. To address the complex issues involved, many companies
42%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
a matching agent for the task on the MCollective community page, you can, of course, develop a new agent with matching clients. Some basic knowledge of Ruby is necessary for this part the SimpleRPC framework
42%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
it to the list of available sessions under Default Settings . You can't delete the Default Settings entry (Figure 3). Figure 3: Setting up a New Unix SSH Session
42%
Exploring Nmap's scripting engine
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
. Fuzzer – Fuzzer scripts are used for discovering new vulnerabilities or identification techniques and generally work by sending random data to a service. Intrusive – Intrusive scripts can either crash
42%
Safeguard your Kubernetes setup with Kanister
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Sebastian Duda, 123RF.com
Maps (Listing 4). At this point, you can now create a new ActionSet to reference the ConfigMap just generated and pass it to the Blueprint just defined (Listing 5). Listing 4 Extending the Blueprint
42%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
arcane hardware issues and shell-scripting mysteries, and takes his McFlurry shaken, not stirred. You can read more from him in the new O'Reilly title AWS System Administration .

« Previous 1 ... 25 26 27 28 29 30 31 32 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice